--null-auth is used. Otherwise, -u/--username and one of -p, --hashes, or --aesKey are required (except when using -k/--kerberos with --no-pass).
Flags
Username for authentication. Required unless
--null-auth is set.Password for authentication. One of
--password, --hashes, or --aesKey is required unless using --null-auth or -k --no-pass.Domain name (e.g.,
corp.example.local). Required when using --audit mode.NTLM hashes in
LMHASH:NTHASH format. The LM portion can be omitted or set to aad3b435b51404eeaad3b435b51404ee (empty LM). Used for pass-the-hash attacks.Format: [LM_HASH]:NT_HASHAES-128 or AES-256 key for Kerberos authentication. Use instead of a password when you have an extracted AES key.
Use Kerberos authentication. Reads the ccache file from the
KRB5CCNAME environment variable when available. Combine with --no-pass to avoid a password prompt when using a ccache.Use Kerberos only for Domain Controllers; fall back to NTLM for all other hosts. RelayKing queries the AD
Domain Controllers group to determine which hosts are DCs. Useful when DCs enforce Kerberos but workstations and member servers still accept NTLM.Do not prompt for a password. Use this with
-k/--kerberos when authenticating via a ccache file.IP address of a Domain Controller. Used for LDAP-based operations such as
--audit and --ntlmv1. Also treated as a known DC target when --krb-dc-only is active.Custom DNS server for hostname resolution. Useful when running through a SOCKS proxy where the default resolver cannot reach internal DNS.
Use TCP instead of UDP for DNS resolution. Useful when UDP is blocked or unreliable in the target environment.
Force LDAP (port 389) for directory operations. By default, RelayKing auto-detects whether to use LDAP or LDAPS.
Force LDAPS (port 636) for directory operations.
Attempt null/anonymous authentication. When set,
-u, -p, and domain are not required. Coercion vulnerabilities (--coerce) are only reported as confirmed findings when the coercion succeeds under null auth.Cannot be combined with
--coerce-all, which requires credentials for AD enumeration.